Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers

Author:   Wenjuan Li ,  Steven Furnell ,  Weizhi Meng
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2022
Volume:   13745
ISBN:  

9783031213106


Pages:   177
Publication Date:   11 December 2022
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $129.35 Quantity:  
Add to Cart

Share |

Attacks and Defenses for the Internet-of-Things: 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers


Overview

This book constitutes the post-conference proceedings of the 5th International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2022, held in conjunction with ESORICS 2022, in Copenhagen, Denmark, in September 30, 2022, in hybrid mode.The 7 full papers and 3 short papers were carefully reviewed and selected from 18 submissions. This workshop focuses on IoT attacks and defenses and discusses either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.

Full Product Details

Author:   Wenjuan Li ,  Steven Furnell ,  Weizhi Meng
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2022
Volume:   13745
Weight:   0.296kg
ISBN:  

9783031213106


ISBN 10:   3031213106
Pages:   177
Publication Date:   11 December 2022
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

The Final Round: Benchmarking NIST LWC Ciphers on Microcontrollers.- Evolving a Boolean Masked Adder Using Neuroevolution.- Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty.- Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.- Post-Quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions.- Effective Segmentation of RSSI Timeseries Produced by Stationary IoT Nodes.- Consumer-friendly Methods for Privacy Protection Against Cleaning Robots.- Resource Efficient Federated Deep Learning for IoT Security Monitoring.- Man-in-the-OBD: A modular, Protocol Agnostic Firewall for Automotive Dongles to Enhance Privacy and Security.- Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation. 

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List